Exam 9: Privacy, Security, and Ethics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet _______.

(Short Answer)
4.8/5
(28)

_______-party cookies are used by advertising companies to keep track of your web activity as you move from one site to the next.

(Short Answer)
4.8/5
(39)

_______ attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate.

(Short Answer)
4.8/5
(38)

Which of the following is the most widely used wireless network encryption for home wireless networks?

(Multiple Choice)
4.9/5
(30)

_______ scanning devices use fingerprints and iris scanners to identify individuals.

(Short Answer)
4.9/5
(35)

Small data files that are deposited on a user's hard disk when they visit a website are called _______.

(Multiple Choice)
4.8/5
(41)

_______ private networks encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.

(Short Answer)
4.8/5
(30)

Which of the following is not a measure to protect computer security?

(Multiple Choice)
4.9/5
(38)

A tracking cookie is used by an advertising company to keep track of your web activity as you move from one site to the next.

(True/False)
4.8/5
(31)

Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?

(Multiple Choice)
4.8/5
(41)

Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called _______.

(Short Answer)
4.8/5
(41)

Which among the following is a way to shut down an ISP or website?

(Multiple Choice)
4.8/5
(39)

Spy removal programs are designed to detect and remove various types of privacy threats.

(True/False)
4.9/5
(42)

Web bugs are usually hidden within the HTML code for a web page or in an e-mail message as an invisible image.

(True/False)
4.9/5
(41)

Information systems consist of people, procedures, software, hardware, data, and the Internet.

(True/False)
4.9/5
(32)

Identity theft and mistaken identity are the same.

(True/False)
4.9/5
(37)

_______ is the illegal assumption of someone's identity for the purposes of economic gain.

(Short Answer)
4.9/5
(36)

It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for.

(True/False)
5.0/5
(38)

How do firewalls work?

(Essay)
4.7/5
(36)

Biometric scanning devices are used to scan employee identification cards.

(True/False)
5.0/5
(33)
Showing 41 - 60 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)